Sciweavers

16070 search results - page 226 / 3214
» Identifying
Sort
View
162
Voted
WWW
2007
ACM
16 years 6 months ago
Spam double-funnel: connecting web spammers with advertisers
Spammers use questionable search engine optimization (SEO) techniques to promote their spam links into top search results. In this paper, we focus on one prevalent type of spam ? ...
Yi-Min Wang, Ming Ma, Yuan Niu, Hao Chen
144
Voted
CHI
2008
ACM
16 years 5 months ago
Heuristic evaluation for games: usability principles for video game design
Most video games require constant interaction, so game designers must pay careful attention to usability issues. However, there are few formal methods for evaluating the usability...
David Pinelle, Nelson Wong
152
Voted
CHI
2005
ACM
16 years 5 months ago
Building security and trust in online banking
Growing threats to online banking security (e.g. phishing, personal identify fraud) and the personal nature of the data make the balance between security, trust and usability vita...
Maria Nilsson, Anne Adams, Simon Herd
HPCA
2002
IEEE
16 years 5 months ago
Quantifying Load Stream Behavior
The increasing performance gap between processors and memory will force future architectures to devote significant resources towards removing and hiding memory latency. The two ma...
Suleyman Sair, Timothy Sherwood, Brad Calder
RECOMB
2008
Springer
16 years 5 months ago
Detecting Disease-Specific Dysregulated Pathways Via Analysis of Clinical Expression Profiles
We present a method for identifying connected gene subnetworks significantly enriched for genes that are dysregulated in specimens of a disease. These subnetworks provide a signat...
Igor Ulitsky, Richard M. Karp, Ron Shamir